Which login credentials are required when connecting to the console port in this output? A. none required B. username cisco with password cisco C. no username with password linepass D. login a ...
Which authentication service is needed to configure 802.1x?
Which authentication service is needed to configure 802.1x? A. RADIUS with EAP Extension B. TACACS+ C. RADIUS with CoA D. RADIUS using VSA Correct Answer: A Explanation Explanation/Refer ...
Which command globally enables AAA on a device?
Which command globally enables AAA on a device? A. aaa new-model B. aaa authentication C. aaa authorization D. aaa accounting Correct Answer: A Explanation Explanation/Reference: To co ...
Which AAA Authorization type includes PPP, SLIP, and ARAP connections?
Which AAA Authorization type includes PPP, SLIP, and ARAP connections? A. network B. IP mobile C. EXEC D. auth-proxy Correct Answer: A Explanation Explanation/Reference: Method lists f ...
While troubleshooting a network outage, a network engineer discovered an unusually high level of broadcast traffic coming from one of the switch interfaces. Which option decreases consumption of bandwidth used by broadcast traffic?
While troubleshooting a network outage, a network engineer discovered an unusually high level of broadcast traffic coming from one of the switch interfaces. Which option decreases consumption of bandw ...
The network monitoring application alerts a network engineer of a client PC that is acting as a rogue DHCP server. Which two commands help trace this PC when the MAC address is known? (Choose two.)
The network monitoring application alerts a network engineer of a client PC that is acting as a rogue DHCP server. Which two commands help trace this PC when the MAC address is known? (Choose two.) ...
The command storm-control broadcast level 75 65 is configured under the switch port connected to the corporate mail server. In which three ways does this command impact the traffic? (Choose three.)
The command storm-control broadcast level 75 65 is configured under the switch port connected to the corporate mail server. In which three ways does this command impact the traffic? (Choose three.) ...
After port security is deployed throughout an enterprise campus, the network team has been overwhelmed with port reset requests. They decide to configure the network to automate the process of re-enabling user ports. Which command accomplishes this task?
After port security is deployed throughout an enterprise campus, the network team has been overwhelmed with port reset requests. They decide to configure the network to automate the process of re-enab ...
A switch is added into the production network to increase port capacity. A network engineer is configuring the switch for DHCP snooping and IP Source Guard, but is unable to configure ip verify source under several of the interfaces. Which option is the cause of the problem?
A switch is added into the production network to increase port capacity. A network engineer is configuring the switch for DHCP snooping and IP Source Guard, but is unable to configure ip verify source ...
A DHCP configured router is connected directly to a switch that has been provisioned with DHCP snooping. IP Source Guard with the ip verify source port-security command is configured under the interfaces that connect to all DHCP clients on the switch. However, clients are not receiving an IP address via the DHCP server. Which option is the cause of this issue?
A DHCP configured router is connected directly to a switch that has been provisioned with DHCP snooping. IP Source Guard with the ip verify source port-security command is configured under the interfa ...
A network engineer wants to ensure Layer 2 isolation of customer traffic using a private VLAN. Which configuration must be made before the private VLAN is configured?
A network engineer wants to ensure Layer 2 isolation of customer traffic using a private VLAN. Which configuration must be made before the private VLAN is configured? A. Disable VTP and manually ass ...
DHCP snooping and IP Source Guard have been configured on a switch that connects to several client workstations. The IP address of one of the workstations does not match any entries found in the DHCP binding database. Which statement describes the outcome of this scenario?
DHCP snooping and IP Source Guard have been configured on a switch that connects to several client workstations. The IP address of one of the workstations does not match any entries found in the DHCP ...
A server with a statically assigned IP address is attached to a switch that is provisioned for DHCP snooping. For more protection against malicious attacks, the network team is considering enabling dynamic ARP inspection alongside DHCP snooping. Which solution ensures that the server maintains network reachability in the future?
A server with a statically assigned IP address is attached to a switch that is provisioned for DHCP snooping. For more protection against malicious attacks, the network team is considering enabling dy ...
Which command creates a login authentication method named "login" that will primarily use RADIUS and fail over to the local user database?
Which command creates a login authentication method named "login" that will primarily use RADIUS and fail over to the local user database? A. (config)# aaa authentication login default radius local ...
Which portion of AAA looks at what a user has access to?
Which portion of AAA looks at what a user has access to? A. authorization B. authentication C. accounting D. auditing Correct Answer: A Explanation Explanation/Reference: AAA consists ...